WhACKY! - What anyone could know about you from Twitter
暂无分享,去创建一个
[1] Martin Szomszor,et al. Correlating user profiles from multiple folksonomies , 2008, Hypertext.
[2] Vassilis Kostakos,et al. Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems , 2008 .
[3] Stephen Farrell,et al. Harvesting with SONAR: the value of aggregating social network information , 2008, CHI.
[4] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.
[5] Eugene Ciurana,et al. Google App Engine , 2009 .
[6] Kyle Lacy. Twitter Marketing For Dummies , 2009 .
[7] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[8] Vincent Y. Shen,et al. User identification across multiple social networks , 2009, 2009 First International Conference on Networked Digital Technologies.
[9] Lise Getoor,et al. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.
[10] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[11] Reza Zafarani,et al. Connecting Corresponding Identities across Communities , 2009, ICWSM.
[12] George Varghese,et al. I seek you: searching and matching individuals in social networks , 2009, WIDM.
[13] Calton Pu,et al. Large Online Social Footprints--An Emerging Threat , 2009, 2009 International Conference on Computational Science and Engineering.
[14] Christopher Krügel,et al. Abusing Social Networks for Automated User Profiling , 2010, RAID.
[15] Albert Esterline,et al. Personally Identifiable Information: Identifying unprotected PII using file-indexing search tools and quantitative analysis , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).
[16] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[17] T. Grance,et al. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .
[18] Ilaria Torre,et al. User data distributed on the social web: how to identify users on different social systems and collecting data about them , 2010, HetRec '10.
[19] Vitaly Shmatikov,et al. Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.
[20] Patrick Gage Kelley,et al. IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network , 2010 .
[21] Xin Shuai,et al. Loose tweets: an analysis of privacy leaks on twitter , 2011, WPES.
[22] Calton Pu,et al. Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks , 2011, IEEE Internet Computing.
[23] Peter Fankhauser,et al. Identifying Users Across Social Tagging Systems , 2011, ICWSM.
[24] Claude Castelluccia,et al. How Unique and Traceable Are Usernames? , 2011, PETS.
[25] Hannes Hartenstein,et al. What Your Friends Tell Others About You: Low Cost Linkability of Social Network Profiles , 2011, SNAKDD 2011.
[26] Anne Helmond,et al. Hit, link, like and share. Organising the social and the fabric of the web. , 2011 .